{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T00:57:48Z","timestamp":1730249868898,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/icmcs.2018.8525979","type":"proceedings-article","created":{"date-parts":[[2018,11,8]],"date-time":"2018-11-08T18:42:06Z","timestamp":1541702526000},"page":"1-4","source":"Crossref","is-referenced-by-count":2,"title":["A Robust Combined Audio and Video Watermark Algorithm Against Cinema Piracy"],"prefix":"10.1109","author":[{"given":"Houria","family":"Kelkoul","sequence":"first","affiliation":[]},{"given":"Youssef","family":"Zaz","sequence":"additional","affiliation":[]},{"given":"Hicham","family":"Tribak","sequence":"additional","affiliation":[]},{"given":"Gerald","family":"Schaefer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WiCom.2008.2913"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.100"},{"key":"ref12","article-title":"Digital cinema watermarking State of art and comparison","volume":"11","author":"kelkoul","year":"2017","journal-title":"International Journal of Computer and Information Engineering"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8i1\/106814"},{"journal-title":"RIAA\/IFPI Request for information on audio fingerprinting technologies","year":"2001","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-005-4151-3"},{"key":"ref6","article-title":"Applications and challenges for audio fingerprinting","author":"kalker","year":"2001","journal-title":"AES 111th Convention"},{"key":"ref5","first-page":"271","article-title":"Audio identification technology overview","volume":"41","author":"kalker","year":"0","journal-title":"Journal of VLSI Signal Processing"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CSNT.2014.131"},{"journal-title":"Cinemetrics","year":"2011","author":"brodbeck","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-013-0483-9"},{"key":"ref1","article-title":"Video fingerprinting using robust hashing of scale invariant features of frames","author":"moolman","year":"2012","journal-title":"Southern African Telecommunication Networks and Applications Conference"},{"key":"ref9","article-title":"A survey of digital watermarking techniques, applications and attacks","volume":"2","author":"singh","year":"2013","journal-title":"International Journal of Engineering and Innovative Technology"}],"event":{"name":"2018 6th International Conference on Multimedia Computing and Systems (ICMCS)","start":{"date-parts":[[2018,5,10]]},"location":"Rabat","end":{"date-parts":[[2018,5,12]]}},"container-title":["2018 6th International Conference on Multimedia Computing and Systems (ICMCS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8488380\/8525492\/08525979.pdf?arnumber=8525979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T20:43:04Z","timestamp":1544474584000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8525979\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icmcs.2018.8525979","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}